926 results
Search Results
Now showing 1 - 10 of 926
Conference Object Producing Synthetic Speech From Turkish Text Via a Single Sound Synthesizer Ic;(2010) Tora,H.; Cengizler,Ç.In this study, new speech sounds were created for Turkish letters from the allophones listed in SpeakJet Magnevation complex sound synthesizer IC, which is intended for English, by selecting and paring the most similiar phonems. Consequently, Turkish Text to Speech synthesizer was implemented with minimum enviroment elements and no physical modification on IC. Paring based on SAMPA showed that all Turkish phonems can be obtained from English allophones with high compatibility. The text to speech and paring algorithm presented herein is developed to be embedded in a microcontroller and capable to vocalize a random Turkish text with SpeakJet IC.Letter The Psychosocial Interventions for the Marmara Earthquake Children Survivors: The Lessons Learned(Taylor & Francis inc, 2021) Cihanoglu, Mine; Vatansever, Merve; Erden, Gulsen[No Abstract Available]Conference Object Citation - WoS: 1A Platinum-Blue Complex Exerts Its Cytotoxic Activity Via Dna Damage and Induces Apoptosis in Cancer Cells(Elsevier Sci Ltd, 2016) Adiguzel, Z.; Ozalp-Yaman, S.; Celik, G.; Salem, S.; Bagci-Onder, T.; Cetin, Y. C.; Acilan, C.[No Abstract Available]Conference Object Citation - Scopus: 2Cost Anaylsis of Interoperable Based E-Procurement System in the Republic of Turkey(Association for Computing Machinery, 2015) Imamoglu,M.Y.; Rehan,M.Approximately 15% of the government's Gross Domestic Products (GDP) is spent on public procurement [1]. Therefore, accountability and transparency in public procurement is very important. For the regulation of public expenditures and effective use of the budget, not only public procurements but also efficient use of infrastructure that make up the system for public procurements should be considered. As a result, the importance of the electronic procurement processes is emphasized in this thesis. Public Procurement Authority (PPA) and the State Procurement and Supply Office (SPSO) responsible for public tenders in the Republic of Turkey are two foundations affiliated to the Ministry of Finance. However, in public procurement, both institutions have their own system, own business processes and legal obligations. Yet is it a privilege to have two different systems? To find the answer to this question, interoperable based Public electronic Procurement (PeP) system and current PeP system are compared with the cost analysis study for the Republic of Turkey. © 2015 ACM.Editorial Citation - WoS: 4Citation - Scopus: 5Discussion of "bearing Capacity of Geocell Reinforcement in Embankment Engineering" by Ling Zhang, Minghua Zhao, Caijun Shi and Heng Zhao 2010,28; 475-482(Elsevier Sci Ltd, 2012) Gurbuz, Ayhan[No Abstract Available]Article Citation - WoS: 4Citation - Scopus: 6Surgical Outcomes of Posterior Persistent Fetal Vasculature Syndrome: Cases With Tent-Shaped and Closed Funnel-Shaped Retinal Detachment(Springernature, 2023) Zeydanli, Ece Ozdemir; Ozdek, Sengul; Acar, Burak; Ozdemir, Huseyin Baran; Aktas, Zeynep; Gurelik, Gokhan; Atalay, Hatice Tuba; Ozdemir Zeydanli, EceBackground/objectives To determine the role of vitreoretinal surgery (VRS) for two different forms of posterior persistent fetal vasculature syndrome (PFVS); with tent-shaped tractional retinal detachment (TRD) and closed funnel-shaped TRD. Subjects/methods Retrospective, single surgeon, consecutive case series of 52 eyes of 44 patients with posterior PFVS who underwent VRS. Cases were divided into "tent-shaped TRD" and "funnel-shaped TRD" groups based on the preoperative TRD configuration. Associated anomalies, functional and anatomical outcomes were evaluated. The cosmetic appearance was defined as poor if there was phthisis bulbi, gross buphthalmos, or corneal opacification; acceptable if there was apparent leukocoria; and excellent if none were noted at the last follow-up. Results Thirty eyes of 29 patients presented with tent-shaped TRD; 70% of which obtained counting fingers or better vision and 90% showed significant reversal of tenting achieving retinal reattachment. The cosmetic appearance was excellent in 87%. Two eyes (7%) became phthisic. Twenty-two eyes of 15 patients presented with funnel-shaped TRD and leukocoria; 45% achieved LP vision and 70% of patients with bilateral pathology had LP in at least one eye. The cosmetic appearance was acceptable to excellent in 73%. Three eyes (14%) became phthisic, one (5%) of which required enucleation. The median follow-up time was 16 (6-71) months. Conclusions VRS often provides functional vision and anatomy in posterior PFVS with tent-shaped TRD morphology. In the funnel-shaped TRD morphology, where no treatment has historically been recommended, surgery may be considered with an aim of restoring light perception and globe preservation, particularly in bilateral cases.Article NEW TURKISH BORROWS LAW ON THE FRAMEWORK OF COMPETITOR PORTER(Istanbul Univ, Fac Law, 2014) Suzek, Sarper[No Abstract Available]Conference Object Citation - Scopus: 9A Layered Security Architecture for Corporate 802.11 Wireless Networks(Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.Book Part A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs(inst Engineering Tech-iet, 2019) Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, NazifeThe continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.Conference Object Citation - Scopus: 8Modeling-Error Based Adaptive Fuzzy Sliding Mode Control for Trajectory-Tracking of Nonlinear Systems(2003) Yu,S.; Yu,X.; Efe,M.O.A novel adaptive fuzzy sliding mode control design is developed for trajectory tracking of a class of nonlinear systems in this paper. This control design uses the modelling error to adaptively estimate the deterministic uncertainties as well as the control gain based on the fuzzy systems approach. By this design, the bounds of the uncertainties are not required to be known in advance, and the robust stability of closed loop systems is analysed in the Lyapunov sense. Simulation results are given to demonstrate the improved performance.

